Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Understanding Bias in Workers' Comp Medical Exams
The reality of workers' compensation life is that "bias" is rampant in the system ' especially when it comes to medical proof presented in litigated matters. This inherent bias should be scrutinized in full context.
<b><i>At the Intersection</i></b>: 'Manterruption' Continued
Last month, we discussed the widespread tendency of men to interrupt women in settings where the power stakes were high ("manterruption") and their tendency to appropriate women's comments and ideas as their own ("bropropriation"). We conclude with some additional thoughts.
FATCA's Due Diligence Expansion
In 2010, Congress enacted the Foreign Account Tax Compliance Act (FATCA) in order to target U.S. taxpayers using offshore accounts to hide monies overseas. Although Congress' purpose and intent in passing FATCA was met, it has been achieved at a cost of imposing heavy burdens on those already compliant.
Cybersecurity Data Sharing Now Available To Law Firms
Law firms now have access to a platform that allows them to share data on cybersecurity threats anonymously.
Strict Liability Claims for Prescription Medical Products
On July 16 of this year, decisions by two federal judges once again spoke to the Pennsylvania Supreme Court's silence on a fundamental issue of tort law applicable to prescription medical product liability claims in the Commonwealth.
Significant UK Court Ruling on Data Protection Liability
The UK's Court of Appeal gave a very important judgment in March 2015 in a case concerning Google's Internet behavior tracking through a browser. First, misuse of private information is now classified as a tort, thereby in this case enabling proceedings to be issued against a party outside the jurisdiction of the UK; and, second, financial compensation for distress caused by breaches of the Data Protection Act 1998 may now be claimed, despite there being no monetary loss.
e-Mail Risk Mitigation For Law Firms
Each day, attorneys create and handle documents that require strict confidentiality to avoid loss of evidentiary privileges. In today's digital workplace, many of these files are exchanged via e-mail. While e-mail allows for convenience, speed and portability, each attorney using e-mail must ask before sending: "Am I putting my client's confidentiality needs and expectations, as well as my ethical obligations, at risk?"
IP News
Federal Circuit: District Courts Must Address <i>Intel</i> Factors In Determining Whether to Modify A Protective Order In Foreign Proceedings <br>Federal Circuit Applies An 'Abuse of Discretion' Standard of Review for a PTO 'Special Circumstances' Determination
Data Sharing in the Cloud
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Online Impersonation Continues, With Varying Consequences
Online impersonation is defined in the New York Code provisions that prohibit the practice, as the act of impersonating another "under an assumed character with intent to obtain a benefit or to injure or defraud another." The foremost case brought under this law, <i>People v. Golb</i>, in many ways epitomizes the bizarre and highly esoteric reasons why someone chooses to impersonate another in the first place.

MOST POPULAR STORIES